Skip to Main Content
Toggle navigation
Library
Library
Information Security at Staffordshire University
Policies
Search the Library website
Search
Information Security at Staffordshire University
Information Polices and guides
Home
Information Security Systems for Staff
Guide to Legislation on Computer use
Policies
Data Protection
Training
Do's & Dont's
Other Resources
Contacts
Information Security FAQ's
Information Services Policies
University IT Regulations
https://www.staffs.ac.uk/assets/it_regs_tcm44-26983.pdf
Opens a PDF
Use of IT Facilities
https://www.staffs.ac.uk/support_depts/infoservices/rules_and_regulations/itrulesandregulations.jsp
Users of the University's IT facilities must comply with the University's policies and regulations governing these facilities. The following activities contravene these regulations and are deemed a serious offence when using any computer connected to the university network.
• Viewing or downloading any form of pornographic, racist or offensive material.
• Using email to send abusive, racist, offensive messages to anyone.
• Harassment of any person via email
Hacking. Downloading material for research purposes that contravene these rules must obtain advance authorisation form Information Services. Accounts are monitored centrally for misuse. Where misuse is suspected then the account may be disabled. (A non functioning account does not necessarily indicate that it has been disabled). Breaches of the IT regulations will lead to disciplinary action. Initially this may involve a warning and an interview with a senior manager within Information Services. Further disciplinary action depends on the severity of the offence and any previous instances by the person in question. Note: The account holder is deemed responsible for the misuse of the account.
Email policy
https://www.staffs.ac.uk/assets/email_policy%20tcm44-26213_tcm44-38038.pdf
Opens a PDF. This Email Policy has been developed in response to the acknowledged need for guidelines describing the acceptable use of the University’s email and related services and facilities. .
Internet Policy
https://www.staffs.ac.uk/assets/internet_policy_tcm44-26800.pdf
To outline procedures to guarantee an appropriate use of the internet which is beneficial to all members of the University
System Backup Policy
https://www.staffs.ac.uk/assets/system_backup_policy_tcm44-80640.pdf
To provide a definition of backups taken to maintain the integrity of University
Wireless policy
Opens in a PDF
https://www.staffs.ac.uk/assets/wireless_policy_tcm44-26795.pdf
T
his policy is to ensure that the deployment of wireless networking is controlled and managed in a centralised way to provide functionality and optimum levels of service whilst maintaining network security. It can no longer be acceptable practice to allow the installation and operation of wireless devices on campus without a clear and agreed policy outlining the roles and responsibilities of all parties.
Janet acceptable use policy
External website
https://www.jisc.ac.uk/network
Password policy
To ensure that staff and student passwords are created and changed in line with University security advice Opens a PDF University security advice
https://www.staffs.ac.uk/assets/password_policy_february2015_tcm44-83668.pdf
Data Protection
https://www.staffs.ac.uk/legal/privacy/10_rules/index.jsp
Ten rules for data protection compliance
Remote Access policy
h
ttp://www.staffs.ac.uk/assets/Remote%20Access%20Policy%20_tcm44-40315.pdf
A policy framework for remote network access to University computers and network devices. Opens a PDF
Students responsibilities when using IT facilities
https://www.staffs.ac.uk/support_depts/infoservices/rules_and_regulations/studentsresponsibilities.jsp
Computing facilities within Information Services managed areas are provided for approved purposes only. .
Information Services position statement on the use of the desktop staff image for publicity / promotional material.
https://www.staffs.ac.uk/assets/Policy%20for%20Remote%20Connection%20to%20End%20User%20Desktops_tcm44-81284.pdf
Opens a PDF 
To detail actions staff should and should not take when ititiating remote connection an end users computer.
<<
Previous:
Guide to Legislation on Computer use
Next:
Data Protection >>